A large number of customers have deployed KEMP's LoadMaster load balancers in conjunction with Microsoft workloads.
A part of the solution for Exchange, Lync or SharePoint a key component has historically been Microsoft's Forefront Threat Management Gateway (TMG). One key feature of TMG was that it offered customers a way to publish and protect workload servers such as Exchange Client Access Servers especially in Internet Facing deployments where a clean separation between critical infrastructure and the public internet is essential.
⦾ End Point Authentication for Pre-Auth
⦾ Persistent Logging and Reporting
⦾ Single Sign On across Virtual Services
⦾ Active Directory Integration
⦾ RADIUS Authentication Support
⦾ Fully Customizable FBA Forms
⦾ Soft Lockout
⦾ Group Membership Validation
⦾ Dual factor auth w/RSA SecurID
http://kemptechnologies.com/microsoft-load-balancing/microsoft-forefront-tmg-replacement/
Follow us on twitter www.twitter.com/kemptech

Creating a firewall access rule in Forefront Threat Management Gateway to Allow ICMP echo and ICMP echo replies. This is called the "Ping" protocol :-( in Forefront TMG
I'm still trying to figure out why an explicit ICMP echo request and ICMP echo reply rule does NOT work on Forefront (There must be some MS Magic behind the Ping "protocol")

http://www.trainsignal.com/Course/204/Forefront-Unified-Access-Gateway-UAG-Essentials?utm_source=YouTube&utm_medium=SocialMedia&utm_campaign=NRForefrontUAGWebApp
In this free video from our Forefront UAG Essentials Training, Microsoft MVP Richard Hicks demonstrates how to set up Forefront UAG to publish Exchange Outlook Web App.
To access our entire IT training library for FREE, sign up for a 3-day trial by clicking on the above link.
-~-~~-~~~-~~-~-
This channel is an archive! Subscribe to Pluralsight for new IT Pro training
➨ https://www.youtube.com/user/Pluralsight?sub_confirmation=1
-~-~~-~~~-~~-~-

This webcast is about Installing And Configuring Forefront Threat Management Gateway (Tmg) For Lync 2010 And Lync 2013
English dubber : Sheila
The webcast will explain TMG installation and configurations you need to use it as a reverse proxy for Lync.
In the agenda we have a note on the future of TMG products and then a short introduction to the role of TMG as a reverse proxy for Lync.
The topics will be "Why I Need TMG With Lync Server ?", a network diagram of the environment we're deploying and a list of the system Requirements for Forefront TMG
After this short introduction we'll see a webcast with the system operation that'll cover the topics Install Forefront TMG, Configure Forefront TMG and Configure TMG For Lync
As usual, for every step there will be an explanation on why and how we're doing a specific operation.

http://www.Pluralsight.com/Forefront-Threat-Management-Gateway-2010-Training.aspx?utm_source=YouTube&utm_medium=Social%20Media&utm_campaign=TMG%20Demo3
In this demo from Pluralsight's Forefront Threat Management Gateway course, Scott Lowe will show you how to publish servers.
-~-~~-~~~-~~-~-
This channel is an archive! Subscribe to Pluralsight for new IT Pro training
➨ https://www.youtube.com/user/Pluralsight?sub_confirmation=1
-~-~~-~~~-~~-~-

http://tech-informer.com - Threat Management Gateway (TMG) is a great extra layer of security which can be added to almost all networks in order to protect any internal or DMZ web site. This video will walk you through the two biggest benefits it provides for this kind of protection.

RE-UPLOADED: ForeFront Protection 2010 for Exchange Server Part_02. Second and final part of the video is about configuring the server properties. Shows how to configure different properties of the services, and how to automate and delete unwanted mail attachments, engine definition upgrades and a basic workaround.

Uploading contracts to an online database should not take too long, and with the right solution, there should be a way to quickly drag and drop them into folders. Of course, the contract management team may want to give some thought as to how those folders are categorized. In some industries, it may make sense to classify them by agreement type, whereas in others they may need to be grouped by timeframe or date. It is obviously important to do what makes sense for your company and to ensure everyone understands the classification system that is instituted. With this sort of well-oiled system in place, it is a lot easier to keep a handle on things.

Divide and Conquer.
This is another area that is very industry-dependent, but it is highly unlikely that any company can afford to have an entire contract team devoted to managing one portfolio. More than likely, it is more realistic to divvy up the team and the contracts so that there is a leader for each relevant sphere. The entire team will obviously have to coordinate and communicate, but resources must be allocated in the most efficient manner possible. In turn, this will allow for several individuals to keep an eye on a smaller batch of contracts, thereby facilitating those periodic reviews.
Outsource the Tedium to Technology.